<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA command in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221711#M1064890</link>
    <description>&lt;P&gt;Thank you very much.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Nov 2017 15:28:10 GMT</pubDate>
    <dc:creator>Lake</dc:creator>
    <dc:date>2017-11-23T15:28:10Z</dc:date>
    <item>
      <title>ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221004#M1064871</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can someone please explain to me exactly what this command mean:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background: yellow; font-family: &amp;quot;Courier New&amp;quot;; font-size: 10pt;"&gt;&lt;STRONG&gt;access-list acl-outside extended permit tcp any4 any4&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background: yellow; font-family: &amp;quot;Courier New&amp;quot;; font-size: 10pt;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background: yellow; font-family: &amp;quot;Courier New&amp;quot;; font-size: 10pt;"&gt;Lake&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:49:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221004#M1064871</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2020-02-21T14:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221009#M1064872</link>
      <description>&lt;P&gt;Hi Lake,&lt;/P&gt;
&lt;P&gt;It is permitting any TCP protocol from any IPv4 source address to any IPv4 destination address.&lt;/P&gt;
&lt;P&gt;Give then the name 'acl-outside' we can assume this is applied to your OUTSIDE interface, and is very permissive!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 15:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221009#M1064872</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2017-11-22T15:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221018#M1064873</link>
      <description>&lt;P&gt;Does that mean that any traffic from outside can go through the firewall to any device inside our network?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Lake&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 15:50:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221018#M1064873</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2017-11-22T15:50:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221065#M1064874</link>
      <description>&lt;P&gt;That depends on the lines above it. If that is the first rule in the ACL, then yes, any IPv4 TCP traffic will be allowed through the interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Whats the output of:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;sh access-list acl-outside&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;sh run | inc access-group&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 16:46:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221065#M1064874</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2017-11-22T16:46:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221072#M1064875</link>
      <description>&lt;P&gt;Here are the coutput of the commands:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sh access-list acl-outside&lt;BR /&gt;access-list acl-outside line 1 extended permit tcp any4 host 10.0.0.8 eq https (hitcnt=26848) 0x8805979e&lt;BR /&gt;access-list acl-outside line 2 extended permit udp any4 host 10.0.0.16 eq ntp (hitcnt=47) 0x6fae11cd&lt;BR /&gt;access-list acl-outside line 3 extended permit icmp any4 any4 echo-reply (hitcnt=0) 0xe16baeb0&lt;BR /&gt;access-list acl-outside line 4 extended permit icmp any4 any4 time-exceeded (hitcnt=379) 0x3c7fae32&lt;BR /&gt;access-list acl-outside line 5 extended permit icmp any4 any4 unreachable (hitcnt=17662) 0xe36cd89f&lt;BR /&gt;access-list acl-outside line 6 extended permit tcp any4 host 10.0.0.220 eq smtp (hitcnt=33439) 0xd96e39f4&lt;BR /&gt;access-list acl-outside line 7 extended permit tcp any4 host 10.11.11.6 eq www (hitcnt=4352) 0x59fb8383&lt;BR /&gt;access-list acl-outside line 8 extended permit tcp any4 host 10.11.11.6 eq https (hitcnt=411) 0x4d944572&lt;BR /&gt;access-list acl-outside line 9 extended permit tcp any4 host 10.11.11.5 eq ftp (hitcnt=22) 0xb3ff894f&lt;BR /&gt;access-list acl-outside line 10 extended permit udp any4 host 10.0.0.107 eq 1812 (hitcnt=0) 0x9f7f68d1&lt;BR /&gt;access-list acl-outside line 11 extended permit tcp any4 host 10.11.11.7 eq https (hitcnt=0) 0xcadb160a&lt;BR /&gt;access-list acl-outside line 12 extended permit tcp any4 host 10.11.11.7 eq www (hitcnt=0) 0xd0284c57&lt;BR /&gt;access-list acl-outside line 13 extended permit tcp any4 host 10.0.0.235 eq 8461 (hitcnt=0) 0x7872f3ad&lt;BR /&gt;access-list acl-outside line 14 extended permit tcp any4 host 10.0.0.186 eq https (hitcnt=527) 0x4bd18b04&lt;BR /&gt;access-list acl-outside line 15 extended permit tcp any host 10.0.0.220 eq smtp (hitcnt=0) 0xdbb575db&lt;BR /&gt;access-list acl-outside line 16 extended permit tcp any host 10.0.0.193 eq https (hitcnt=98) 0x3c452f2d&lt;BR /&gt;bwfw# sh run | inc access-group&lt;BR /&gt;access-group acl-outside in interface outside&lt;BR /&gt;access-group dmz-in in interface dmz&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;BR /&gt;Lake&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 16:52:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221072#M1064875</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2017-11-22T16:52:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221077#M1064876</link>
      <description>&lt;P&gt;The ACL line you had in your original post, does not appear in that output.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the output from:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;sh run | inc acl-outside&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 17:01:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221077#M1064876</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2017-11-22T17:01:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221080#M1064877</link>
      <description>&lt;P&gt;Sorry. I forgot to mention that I removed it a couple days ago. Does that mean that that command allows all tcp traffic from any ip addresses from&amp;nbsp;the internet&amp;nbsp;to any devices on our network?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Lake&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 17:04:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221080#M1064877</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2017-11-22T17:04:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221082#M1064878</link>
      <description>&lt;P&gt;Yes, it shadows every TCP rule in the ACL, essentially making their definition redundant.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 17:08:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221082#M1064878</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2017-11-22T17:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221087#M1064879</link>
      <description>&lt;P&gt;Sorry. I am not quite sure what you mean. Does that mean that each rule is duplicated or was it opening all the ports from the internet coming in to our network?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Lake&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 17:11:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221087#M1064879</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2017-11-22T17:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221113#M1064880</link>
      <description>&lt;P&gt;Both. A shadow rule is one that provides the same functionally as an existing rule by being more broad in scope.&lt;/P&gt;
&lt;P&gt;In your case you have multiple TCP IPv4 rules which specify destination hosts and ports. The rule which you removed provided the same permissions by allowing TCP traffic to ANY host on ANY port.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 17:30:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221113#M1064880</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2017-11-22T17:30:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221126#M1064881</link>
      <description>&lt;P&gt;I take that you mean that any computer on the internet can access any devices on our network that is specifically&amp;nbsp;listed on the ACL on&amp;nbsp;any ports&amp;nbsp;but they cannot access any other devices which are not listed in the ACL?&amp;nbsp; Is that correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Lake&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 17:40:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221126#M1064881</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2017-11-22T17:40:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221136#M1064882</link>
      <description>&lt;P&gt;For a machine on the internet to access a host on your network, a static NAT rule would need to be present.&lt;/P&gt;
&lt;P&gt;These static NAT rules are typically accompanied by a restrictive ACL to limit which ports can be reached on the inside host.&lt;/P&gt;
&lt;P&gt;If you are only using static PAT, then you will already be defining which destination port is reachable, so an "any4 any4"rule won't cause any harm.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this is an internal firewall with no NAT, then TCP traffic would have been able to flow freely through it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 17:46:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221136#M1064882</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2017-11-22T17:46:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221143#M1064883</link>
      <description>&lt;P&gt;Sorry again but was this rule harmful to our network given all the information I provided?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Lake&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 17:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221143#M1064883</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2017-11-22T17:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221154#M1064884</link>
      <description>&lt;P&gt;Is this a border firewall? We would probably need to see the NAT configuration to determine if there was a risk attached to the ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a rule of thumb, such a permissive ACL normally finds its way into production because of lazy configuration/ troubleshooting, and as such should not be present.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 18:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221154#M1064884</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2017-11-22T18:09:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221168#M1064885</link>
      <description>&lt;P&gt;I have attached the NAT statements. I would be very shocked if this was a harmful ACL because we got Cisco to go over the configuration and we had a security company managing our firewall and they had access to it. Please advise.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Lake&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 18:35:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221168#M1064885</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2017-11-22T18:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221285#M1064886</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just checked the ACL configuration (very quickly) and I can tell you there is no need to have that ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You would have that ACL only if you are troubleshooting the fw (only for a minute or so) and you want to check whether the FW is dropping a TCP connection or not but having it in production it's basically like having no firewall for TCP session (please allow any TCP session from anyone on the outside to any asset on the inside {Of course that asset needs to be advertised by NAT and you have a few of those}).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can remove it as this is not safe&amp;nbsp;@ all&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 21:26:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221285#M1064886</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2017-11-22T21:26:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221470#M1064887</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;We need to see the host addresses of the those network objects to determine if there is a specific ACE in acl-outside covering them. If there isn't then we can assume that NAT'd traffic to those hosts was permitted by the 'any4 any4' rule, and is no no longer functioning correctly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2017 08:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221470#M1064887</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2017-11-23T08:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221697#M1064888</link>
      <description>&lt;P&gt;Thanks a lot to everyone who helped answer my questions. I do have one more question. what does this command do: aaa authorization exec authentication-server auto-enable?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Lake&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2017 15:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221697#M1064888</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2017-11-23T15:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221709#M1064889</link>
      <description>&lt;P&gt;It is a AAA method to check if a successfully authenticated user can enter EXEC mode, and if so enter EXEC mode automatically upon login.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2017 15:26:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221709#M1064889</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2017-11-23T15:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA command</title>
      <link>https://community.cisco.com/t5/network-security/asa-command/m-p/3221711#M1064890</link>
      <description>&lt;P&gt;Thank you very much.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2017 15:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-command/m-p/3221711#M1064890</guid>
      <dc:creator>Lake</dc:creator>
      <dc:date>2017-11-23T15:28:10Z</dc:date>
    </item>
  </channel>
</rss>

